Marcin Wójcik
Marcin Wójcik
Afiliação desconhecida
Email confirmado em cam.ac.uk
Título
Citado por
Citado por
Ano
Re-architecting datacenter networks and stacks for low latency and high performance
M Handley, C Raiciu, A Agache, A Voinescu, AW Moore, G Antichi, ...
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
1362017
Does my device leak information? an a priori statistical power analysis of leakage detection tests
L Mather, E Oswald, J Bandenburg, M Wójcik
International Conference on the Theory and Application of Cryptology and …, 2013
712013
Where has my time gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
322017
Where Has My Time Gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
322017
Security analysis of an open car immobilizer protocol stack
S Tillich, M Wójcik
International Conference on Trusted Systems, 83-94, 2012
312012
Emu: Rapid prototyping of networking services
N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ...
2017 USENIX Annual Technical Conference (USENIX ATC 17), 459-471, 2017
302017
A leakage resilient MAC
DP Martin, E Oswald, M Stam, M Wójcik
IMA International Conference on Cryptography and Coding, 295-310, 2015
262015
Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik
International Conference on Trusted Systems, 271-288, 2011
262011
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
192010
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and …, 2016
182016
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014
172014
ICEPOLE v1
P l Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
92014
ICEPOLE v1
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
Submission to CAESAR, 2014
82014
The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication
RC Staudemeyer, HC Pöhls, M Wójcik
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
72018
ICEPOLE v1. submission to CAESAR competition
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
72015
A practical device authentication scheme using SRAM PUFs
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik, W Wu
Journal of Cryptographic Engineering 2 (4), 255-269, 2012
72012
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net
RC Staudemeyer, HC Pöhls, M Wójcik
Journal of Reliable Intelligent Environments, 1-24, 2019
52019
On reconfigurable fabrics and generic side-channel countermeasures
R Beat, P Grabher, D Page, S Tillich, M Wójcik
22nd International Conference on Field Programmable Logic and Applications …, 2012
52012
Thor-the hardware onion router
T Güneysu, F Regazzoni, P Sasdrich, M Wójcik
2014 24th International Conference on Field Programmable Logic and …, 2014
42014
On the (re) design of an FPGA-based PUF.
P Grabher, D Page, M Wójcik
IACR Cryptology ePrint Archive 2013, 195, 2013
42013
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20